Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption Security Your Rights Online

PGP Ruled as Relevant For Criminal Case 675

waytoomuchcoffee writes "A Minnesota appeals unamimously ruled in a child porn case that "the existence of an encryption program" on the defendants computer could be admitted as evidence of criminal intent. The article doesn't mention if this can be taken into account for sentencing too."
This discussion has been archived. No new comments can be posted.

PGP Ruled as Relevant For Criminal Case

Comments Filter:
  • by zoloto ( 586738 ) * on Wednesday May 25, 2005 @12:39AM (#12631012)
    "We find that evidence of appellant's Internet use and the existence of an encryption program on his computer was at least somewhat relevant to the state's case against him," Judge R.A. Randall wrote in an opinion dated May 3.

    I find this very disturbing based on the attitude people have regarding encryption. It's seen in such a negative way as if everyone who uses encryption as evil. Let me put it this way:

    ENCRYPTION != EVIL

    I use this for my day to day communications. Either over IM, E-Mail or moving things from server to server (GPG, then sending the file via FTP etc.). How do we help the public to understand that just because someone wants to keep something secret, even under a mass of public scrutiny, it does not constitute someone breaking the law! I have a TON of letters to and from my girlfriend that are encrypted, that she herself does as well!

    I'm not saying the guy accused of the crime shouldn't produce keys, he obviously was doing something totally heinous by photographing a 9 year old in sexual position, and then those pictures destroyed. Predators of this nature are f-ing sick creatures that need some bad rehabilitation.

    My point is the attitude of the people. Admission of the fact that he had PGP on his computer shouldn't be a condemning factor of his behavior and should be based on his crimes. NOT THE FACILITATOR, MEANS, TOOL (Physical or otherwise) OR SOFTWARE to commit such crimes. He was using perfectly legal encryption utilities and software.

    Just because they were for hiding his crimes/pictures should NOT be a factor in his punishment. What kind of precedent would the judge be inadvertently (or purposely??) placing on the use and ownership of encryption and the tools to do such?

    ~zoloto
    • by Beryllium Sphere(tm) ( 193358 ) on Wednesday May 25, 2005 @12:43AM (#12631035) Journal
      >Just because they were for hiding his crimes/pictures should NOT be a factor in his punishment.

      We don't even know that much. All that was reported is that he had PGP installed, not that he had any encrypted pictures.

      I wonder why the EFF wasn't mentioned.

      I use PGP for clients's data myself.

      Hey, if posession is a problem, what about all those recent Windows versions with EFS preinstalled?
    • by pHatidic ( 163975 ) on Wednesday May 25, 2005 @12:45AM (#12631045)
      I'm not saying the guy accused of the crime shouldn't produce keys

      It also depends on whether he was using PGP to encrypt just his email or his HD, since newer vesions can do either. Personally I don't think he should have to produce the keys either way, but there is a difference. If he was just using PGP for email then it should be entirely irrelevant, since obviously no nine year old girl is going to have PGP on her email (or at least any 9yo girl who does should be smart enough not to hang around pedophiles).

      • by Elshar ( 232380 ) <elshar&gmail,com> on Wednesday May 25, 2005 @02:28AM (#12631589) Journal
        Right, of course the victim (the 9 year old girl) probably doesn't even own a computer.

        How 'bout the other child pornographers that he's likely sharing the pictures with? Oh, yea. Them. They'd probably also be using PGP, as I doubt they'd want their email sniffed/syphoned off and read in an unencrypted fashion.

        And the last remark is uncalled for. Those children subjected to the whims of the pedeophiles might have no idea what they're doing, or they might be bullied, forced, coerced into doing so. How do you know? Maybe the pedophile is related to them?

    • by srw ( 38421 ) * on Wednesday May 25, 2005 @12:46AM (#12631056) Homepage
      If you had carefully RTFA, you would notice that nobody is suggesting that encryption software is illegal. They included it as a component of their case to establish _criminal intent_. In other words, if he's hiding something, he knows he has something to hide, therefore he knows he's doing something wrong... not just really, really stupid. Again, they're not suggesting everybody that has encryption software knows they're doing something wrong... in this case, the fact that he was doing something wrong was established with other evidence. The fact that he knew that what he was doing was wrong was supported by the fact that he tried to hide it. The same argument would probably be made if he had locked the pictures in an industrial-strength safe. As usual, the FA is not as bad as the slashdot headline.

      • by MntlChaos ( 602380 ) on Wednesday May 25, 2005 @12:56AM (#12631127)
        FBI: You Tried to launder money to the Soviets, didn't you?

        Person: No. I didn't.

        FBI: Then how do you explain this encryption software on your computer. You obviously have something to hide.

        Person: No. And if I did, that would be none of your business

        FBI to jury: Yup. He's guilty.

        You might as well say that "The fact he knew that what he was doing was wrong was supported by the fact that he didn't tell anyone about it." A right to privacy should be guaranteed. I shouldn't have to defend my use of tools which help ensure my privacy
        • But if you selectively encrypt some documents and not others, it implies that you may have a particular reason to hide those documents. That makes it unreasonable to claim that you didn't know it was wrong.

          If all your documents are encrypted, or at least many documents that aren't related to a crime, there's no implication that you're hiding something in particular. Then you can make the "I didn't know" argument.
          • by Anonymous Coward on Wednesday May 25, 2005 @02:01AM (#12631442)
            But if you selectively encrypt some documents and not others, it implies that you may have a particular reason to hide those documents. That makes it unreasonable to claim that you didn't know it was wrong.

            The particular reason for encrypting certain documents may be so that your little sister won't read your diary. You don't care if she reads your term paper, so it isn't encrypted. There is nothing wrong, morally or legally, with the content of the encrypted documents. You simply want them to remain private. It is perfectly okay to keep documents or correspondence you don't want the world to read while at the same time keeping stuff you don't mind others seeing.

            TFA doesn't say that the man used encryption to cover up illegal activity, but that the very existence of PGP itself indicated criminal intent, which is ludicrous.
          • by orangesquid ( 79734 ) <orangesquid@nOspaM.yahoo.com> on Wednesday May 25, 2005 @02:01AM (#12631445) Homepage Journal
            Selective? Well, of course. I don't encrypt every single homework assignment or shell script I write!

            I do encrypt things like bank records, sensitive databases, private letters, etc.

            Of course, it's easier to just encrypt your whole $HOME directory. Put it on an encrypted partition. Then you can say, "I keep all of my data encrypted so my identity can't be stolen, so people can't poke into my private life, etc."

            Maybe in fact I *should* encrypt my homework. At the university of delaware, the policy is, if someone cheats off of you, both them and you get in trouble. If I leave my laptop unguarded for a moment someone else in my class scp's the data to his computer, I'll get in trouble for it, when I've really done nothing wrong**. In that case, an encrypted $HOME directory would be useless, since if you're logged in, the whole directory would be unencrypted.

            (** = Some may argue I should not leave my laptop unattended. Why? How about this---you leave your car parked unattended in your driveway, so it's okay for me to just walk up and take the engine out? Just because something's unattended doesn't make it OK to tinker with!)
            • by steve_l ( 109732 ) on Wednesday May 25, 2005 @06:10AM (#12632258) Homepage
              My laptop got stolen from my own house last year; in hibernate state.

              Revoking SSH keys took as much time as killing card info, There is so many places sensititive data could end up (like your bank login/card info), such as
              -hibernate file
              -pagefile
              -browser password store
              -browser page cache
              -directory where I save PDF shopping receipts
              -mailbox

              Now I lock a lot of the system down. Not just my home dir
              -temp
              -browser cache
              -various program directories.
              This is win32, where the EFS stuff doesnt encrypt filenames, just the contents. Its known that EFS is breakable (just reset the login password or something), but to make it harder

              1. laptop needs a bios password.
              2. that password is also used to enable the HDD
              3. My winnt EFS private key is stored in the laptop TPM module.

              #3 is interesting. I know TPM is associated with 'evil-DRM-Trusted-computing-stuff', but I use it as an unbreakable store of my sensitive keys. If what the inventors say is true (I work with some of them), you'd have to be a stronly motivate government to stand a chance of getting stuff off the TPM, so implicitly, off this hard disk.

              Does this make me a criminal? I dont think so. The police told me off for not bios-locking my last box. Their view is the less usable stolen laptops are, the less valuable they are, so theft reduces all round. It is every laptop owner's duty to lock down their boxes so nobody can get at them!
              • #3 is interesting. I know TPM is associated with 'evil-DRM-Trusted-computing-stuff', but I use it as an unbreakable store of my sensitive keys. If what the inventors say is true (I work with some of them), you'd have to be a stronly motivate government to stand a chance of getting stuff off the TPM, so implicitly, off this hard disk.

                If your work with the inventors, you should know one thing. It is not trusted computing that is seen as inherently unsafe or "bad". That is the (IMHO VERY harmful) anti-tcpa p
        • by philipgar ( 595691 ) <pcg2&lehigh,edu> on Wednesday May 25, 2005 @01:20AM (#12631263) Homepage
          This case could be more analagous with the following added components:

          FBI: You Tried to launder money to the Soviets, didn't you?

          Person: No. I didn't.

          FBI: We caught you exchanging money with operatives in soviet russia.

          Person: Uh . . .

          FBI: We also found this encryption software on your computer. You are likely to have something to hide.

          Person: No. And if I did, that would be none of your business

          FBI to jury: Yup. He's guilty.
          • This case could be more analagous with the following added components:

            FBI: You Tried to launder money to the Soviets, didn't you?

            Person: No. I didn't.

            FBI: We caught you exchanging money with operatives in soviet russia.

            Person: When?

            FBI: You know when.

            Person: I do?

            FBI: Just answer the question.

            Person: What question?

            FBI: Uh. Encryption! You have encryption software on your computer, don't you?

            Person: Yep.

            FBI: So, you have something to hide.

            Person: Sure, my credit card numbers that I use on line,
            • This case would be more analogous with the following added and modified components:

              FBI: You Tried to launder money to the Soviets, didn't you?

              Person: No. I didn't.

              FBI: We caught you exchanging money with operatives in soviet russia.

              Person: I didn't know that was wrong.

              FBI: We found encryption software and encrypted files on your computer from the same time we caught you exchanging money with the soviets. You knew it was wrong.

              Person: Encryption is irrelevant to this case!
            • This case could be more amusing with the following added components:

              FBI: You Tried to launder money to the Soviets, didn't you?

              Person: No. I didn't.

              FBI: We caught you exchanging money with operatives in soviet russia.

              Person: When?

              FBI: You know when.

              Person: I do?

              FBI: Just answer the question.

              Person: What question?

              FBI: Uh. Encryption! You have encryption software on your computer, don't you?

              Person: Yep.

              FBI: So, you have something to hide.

              Person: Sure, my credit card numbers that I use on line, per
        • A right to privacy should be guaranteed.

          Should be, but it's not. Read the bill of rights. "Right to privacy" is not one of them. Privacy is a privilage.

          That said, it is pretty silly that having encrytpion applications constitutes criminal intent. Encryption is built into OSX, and hell, I even use it for my home directory. Does that mean I have criminal intent? No! I simply don't want whoever steals my laptop to be able to access my stored passwords and such.
          • by Doctor_Jest ( 688315 ) * on Wednesday May 25, 2005 @02:39AM (#12631634)
            Call me wacky, but:

            The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated... (and so on...)

            Has a privacy ring to it.... It's a right. If you want to keep something to yourself... this particular amendment provides a mechanism for which you are able to do that. Granted, it is not specifically stated "privacy", but applying the reasonable man test, you can see where privacy is upheld over public scrutiny. When privacy needs to be violated, it requires more work than just "LET ME SEE YOUR STUFF." :-) And for good reason, as evidenced by the groupings and subjects of amendments 1 - 10.

            Which, if our courts weren't so broken, judicial review would toss out the "sneak and peek" provisions of the Patriot Act faster than you can say "Amendment IV".

      • As usual, the FA is not as bad as the slashdot headline.

        Sigh. My headline as entered was PGP ruled as "evidence of criminal intent"
        • by amliebsch ( 724858 ) on Wednesday May 25, 2005 @01:49AM (#12631397) Journal
          This is one of those rare cases when the slashdot headling is MORE accurate than the headline of TFA. That's because the court did NOT rule that PGP is evidence of criminal intent. Instead, it ruled that the existence of PGP was relevant to the state's case.

          Consider the following analogy: I murder someone on the street and flee in a red car. An eyewitness can't identify me but testifies that they saw a red car speeding away. The state introduces my auto title showing that my car was red.

          The fact that I own a red car is admitted into evidence! But not because owning a red car is itself proof of guilt! Rather, it's because it's relevant to the state's case, as evidence of a plan or simply the means of execution.

          Thus, Slashdot is right - the court found it "relevant" - and TFA is wrong - encryption is not itself evidence of criminal intent.

      • by rpdillon ( 715137 ) on Wednesday May 25, 2005 @01:22AM (#12631272) Homepage
        Yes, but by this logic, if someone "takes the fifth", it could be used to incriminate them, which kind of destroys the purpose of the right.

        Why is this relevant? Well, if he is using encryption, and they ask him for his key to decrypt the files, I'd say that would be him testifying against himself. Along those same lines, if he refuses to give the key (because he has the right NOT to incriminate himself), they are basically saying "Hey, we don't need the key, because he wouldn't be hiding anything if he had nothing to hide, so he must be guilty!"

        This really represents a failure on the part of the judge. The only thing encryption represents is an unknown: not intent, not a particular set of data. You might as well hand they police a blank drive and infer from that "He must have erased it, and he wouldn't have done that unless he was guilty!"
      • by Vellmont ( 569020 ) on Wednesday May 25, 2005 @01:27AM (#12631295) Homepage
        Have you ever used an envelope to conceal your communications, or do you let just everyone see what you're writing? Have you ever used https in a transaction? If so I guess you have something to hide as well.

        The fact that he knew that what he was doing was wrong was supported by the fact that he tried to hide it.

        And if you had read the article carefully, you would have noticed that there's no evidence he tried to hide the files. From the article:

        The court didn't say that police had unearthed any encrypted files or how it would view the use of standard software like OS X's FileVault.

        Using your analogy it's more like they found an empty bargain-bin safe at the house, and used that as evidence against him. "The man had a SAFE! Only criminals have safes!". As far as comparing PGP to a "industrial strength safe", well that might be a good comparison.. if all safes were industrial strength and given away very cheap or free.
      • You know, this reminds me of some parody of how things can be twisted. While the example i'm going to bring up is not directly related, i think there is a lot of parallel between the reality and the parody version:

        Bread Kills!

        Have you had your daily bread?

        1. Almost 100% of gun owners have eaten some form of sliced bread.

        2. Over 99% of all hunters make their sandwiches using bread on both sides.

        3. All people carrying concealed weapons are found within two miles of bread.

        4. Conv

      • Isn't this the same kind of reasoning that has led to things like witch hunts and the spanish inquisition? This is a dangerous way of thinking that criminalizes anyone with a desire to preserve their privacy... something our current government would love to turn into law at the drop of a hat.
    • I agree with you. It's bullshit.

      Some of us like this little thing called PRIVACY. It's something that you get less and less of these days and it's only going to get worse. RFID national ID cards, bias against encryption, tracking databases, no travel without ID..

      The excuse is always "If you're not hiding anything you don't have anything to worry about." I don't know what these people are afraid of. Why can't I go about my life without being tracked? Why is it a bad thing that I want to encrypt my
    • by anagama ( 611277 ) <obamaisaneocon@nothingchanged.org> on Wednesday May 25, 2005 @01:22AM (#12631274) Homepage
      Let me preface this by saying I know nothing of MN law or the facts of this case beyond the short article. However, I am a lawyer and I can guess at why the prosecution would want to get this evidence in the record and why it would be admitted.

      The Prosecutor would likely argue that the existence of the encryption software demonstrates that the defendant knew that what he was doing was wrong and that he was trying to hide damning evidence. Hiding evidence against you is frowned on. If you know evidence could be used against you and then go about destroying it, in certain situations the court is entitled to instruct the jury to presume that the destroyed evidence would be harmful to your case.

      Now, encrypted evidence may not be literally destroyed, but it is as good as destroyed as long as it remains encrypted. It's kind of like a shredded document -- although it is conceivable that it could be reassembled, if it is mixed with enough random material, reassembly is all but impossible.

      Anyway, I don't see this as a suggestion that encryption is bad per se. I see it as an extension of basic evidence rules -- if there is other evidence suggesting you have bad files and you have intentionally made those file unreadable, the tools you used to do that are possibly relevant. Kind of like pointing out the defendant owned a shredder, there was huge pile of shredded paper by it, and the "smoking gun" documents are no where to be found.

      Last, it doesn't exactly sound like PGP was a "factor in his punishment". Rather, it sounds like it was a factor in his conviction. If the court had ruled that the evidence was inadmissible, then a new trial might have been ordered. This would require a finding that the irrelevant evidence was prejudicial enough that it could have formed a basis for the conviction. If the error was not considered substantial, then no new trial would have been ordered. Obviously, one never reaches the punishment phase without conviction, but I didn't read anything that suggested the punishment was more severe by virtue of the PGP software (kind of like a firearm enhancement).
    • ENCRYPTION != EVIL

      OK, agreed.

      But I wouldn't necessary put it that way if I needed to make a point. Even if you get somebody to agree with you, it doesn't necessarily help them draw more accurate inferences. Indeed their inferences might still differe hardly from if they thought it was evil. The point here is that they were instructed to consider encryption as evidence. Well, OK, but how to they weight that evidence? Bayes therem says: P(A|B) = P(B|A)*P(A)/P(B).

      People have a kind of rough intuitive unde
  • by Dancin_Santa ( 265275 ) <DancinSanta@gmail.com> on Wednesday May 25, 2005 @12:41AM (#12631024) Journal
    And with other evidence, why shouldn't it be? In fact, the presence of it ought to lead prosecutors to tack on the charge of conspiracy.

    Just like the presence of a gun during a robbery lifts the crime to armed robbery, the presence of encryption ought to imply not only that the culprit intended to commit the crime but also intended to cover it up as well.
    • by hey! ( 33014 ) on Wednesday May 25, 2005 @01:27AM (#12631290) Homepage Journal
      Just like the presence of a gun during a robbery lifts the crime to armed robbery, the presence of encryption ought to imply not only that the culprit intended to commit the crime but also intended to cover it up as well.

      Well, if I use a gun in a robbery, that makes it armed robbery. But if I own a gun that is not used in the robber (say it's locked in a safe at home) does any robbery I undertake automatically become armed robbery? I mean, don't you think there should be evidence that I actually used the gun in the robbery?

      That said, this isn't what the court decision is about. It isn't saying he is guilty because he has encryption software. It's saying the jury can consider that as evidence.

      Mathematically, it is true that the significance of a fact depends on context. Thus something which in isolation doesn't mean much can become significant when joined to other facts. However, some things are so commonplace that you can't fit them into anyt kind of logical structure that will help you make a conclusion.

      You might as well say that bank robbers wear shoes and the accused owns several pair.

      Fortunately with the other evidence against him, I doubt this spurious instruction had any effect.
    • by beej ( 82035 ) on Wednesday May 25, 2005 @01:36AM (#12631343) Homepage Journal
      Just like the presence of a gun during a robbery lifts the crime to armed robbery, the presence of encryption ought to imply not only that the culprit intended to commit the crime but also intended to cover it up as well.

      I see what you're saying...but there are several flaws in this reasoning, both theoretical and practical.

      1. There was no evidence PGP was being used to encrypt anything, or that he was even planning to do that.

      2. The inclusion of PGP in the evidence is intended purely to sway the judge and jurors and presents no real information about the case. This is Cheating. It's like when a newspaper needs a story to be more sensationalistic, they say things like, "Aside from two pounds of marijuana, two guns were recovered from the residence." And then they don't tell you it was just a 22 rifle and a pellet gun.

      3. Everyone has strong crypto on their machine. So by your reasoning, every time a crime involves a computer (which is going to be practically every planned crime these days), it should automatically carry some sort of conspiracy charge. This is pointless, just like saying the presense of envelopes in one's house obviously shows that the owner planned to hide his actions when mailing his co-conspirators.

      4. Telling people that crypto is bad is also Extremely Bad, as attested to by so many other posts today. Crypto is good. Just like we allow a child pornographer to mail his wares undetected in an envelope, we allow him to email them encrypted. The alternative is simply worse, and we choose the lesser of the two evils. Smart people know this; jurors are more easily swayed, as I mentioned in point #2.

      (And for the record, when it comes to child pornographers, there can be no punishment too severe.)

  • by lavalyn ( 649886 ) on Wednesday May 25, 2005 @12:42AM (#12631032) Homepage Journal
    Yes, the crime is reprehensible and unforgivable.

    But that doesn't mean the presence of encryption tools meant he was guilty. Encryption tools have many uses, some of which are good - like authentication and assurance of confidentiality. It's great to have encryption tools like PGP when you're sending an email to your broker that you want to issue a stock trade from your investments account. Or to be reasonably assured that discussing a prototype / secret business proposal will not be intercepted.

    Encryption is merely a tool, to be used for both good and evil. A mail envelope can contain mail, or it can contain anthrax. An encrypted document could be a plot by terrorists, or it could be just any other email.
    • ...Encryption tools have many uses, some of which are good...

      I would like to believe that MOST of the reasons for encryption use is good. Let's not outweigh the frequency of "wrong" uses with the actual numbers of good reasons.

      Real national security issues.
      Business uses.
      Classified government files (fbi, cia, nsa etc)
      Personal uses that are not illegal

      vs. covering up crimes or crimes in progress

      That's my arguement anyhow.
  • can anyone say... (Score:3, Interesting)

    by remove office ( 871398 ) on Wednesday May 25, 2005 @12:45AM (#12631043) Homepage
    dangerous precedent?
  • by Fookin ( 652988 ) <fookin AT gmail DOT com> on Wednesday May 25, 2005 @12:48AM (#12631066)
    IANAL, but if you refuse to give up your private key and you have something to hide, can the state force you to reveal it? Or is that tantamount to forcing you to incriminate yourself? I would think that any information concerning encrypted data in that scenario would be inadmissable since it would probably prejudice a jury.

    As a side note, with that earlier /. article [slashdot.org] about the MS guy saying to write your passwords down, is encrypting my password list an act with criminal intent?

  • Awesome. (Score:5, Insightful)

    by cfalcon ( 779563 ) on Wednesday May 25, 2005 @12:48AM (#12631069)
    I used Fedora Core 2. Encryption built right in, 256 bit in any of a few flavors. I encrypt my journal, which has nothing illegal in it. But, if I'm unwilling to let someone read my personal files, why not accuse me of any number of terrible things? Terrorist? Necrophile? Hell, rack'em up boys! If he has an encryption program, he's obviously a criminal?

    Good citizens have nothing to hide, after all. Why don't we just ban encryption entirely? And we'll install the cameras here and here...

    Seriously...

    I'm not totally familiar with what this means legally, but I know it's a bad thing. And a reason for every OS to include it by default, PRONTO!

    If this stands up, privacy will take a beating.
  • c'mon stupids (Score:3, Informative)

    by Anonymous Coward on Wednesday May 25, 2005 @12:49AM (#12631080)
    Read the article! Quit posting in a vain attempt to be first.

    He already committed the f'ing crime.

    Levie's conviction was based on the in-person testimony of the girl who said she was paid to pose nude, coupled with the history of searches for "Lolitas" in Levie's Web browser.

    The guy wasn't convicted because of the crypto. It's like finding the dead body... and then finding the shovel, the canvas bag, etc.
    • If he was making "artful" works, it's not against the law to take nude pictures of children. If it was, all our mothers would be pornographers. You can't tell me your mom doesn't have a photo of you from when you were 2 or 3 running around the yard naked..
  • by rice_burners_suck ( 243660 ) on Wednesday May 25, 2005 @12:49AM (#12631082)
    I would not view this decision as a threat against PGP in particular or encryption software and/or algorithms in general. The court is merely trying to determine the intent of the defendant.

    The encryption software here is treated in the same manner as an item such as a large bag would be treated in a shoplifting case. That is, if you go into a store, see something you like, grab it, and run, the court would likely view that as something that you did at the spur of the moment, without putting much forethought into it. The crime, while still very much a crime, would likely be treated as a stupid action you took because you didn't stop to think if it was right or wrong, and the sentence would likely be applied with some leniency. In such a case, assuming the item costs less than $400.00, the crime would be treated as a misdemeanor. On the other hand, if you had entered the store with an unnecessarily large bag that is mostly empty, this might, in the eyes of the court, show that you had planned to shoplift from the outset, and you would receive a much stiffer punishment. In this case, the crime would likely be treated as a felony, regardless of the item's value.

    In much the same way, the court handling this pornography case is probably trying to determine under which of the statutes the aforementioned materials fall, and the presence of software used with the intent to traffic in such material, regardless of the software's generally accepted purpose, can allow the prosecution to go for a crime with stiffer penalties.

    In other words, if you use PGP, don't worry, because it's not going to be outlawed. But if you're the guy in that pornography case, be afraid... be very afraid. Here in Soviet Russia, pornography encrypts YOU!

    As an aside, one should not look at pornography, because it can have an adverse effect on future relationships that you might have.

    • one should not look at pornography, because it can have an adverse effect on future relationships that you might have.

      I thought we just shouldn't look at it for fear of making baby Jesus cry?
    • by RedBear ( 207369 ) <redbear@@@redbearnet...com> on Wednesday May 25, 2005 @03:44AM (#12631841) Homepage
      You, like many others today, miss the important distinction, and the mods didn't catch it. What possible purpose could you have for carrying a large empty bag into a store, other than shoplifting? Its presence is a strong indicator that you were planning on shoplifting something. The mere presence of encryption software has no relation. It is not a strong indicator of anything, unless they can establish as fact that you purchased or used the software specifically for committing a crime. It is merely a general tool, like the computer itself, or the envelopes you use to mail letters. The fact that he uses envelopes to mail letters, or the fact that he owns a computer in the first place, was not used as supporting evidence of criminal intent.

      There are so many other legal uses of encryption software that a ruling like this should always be considered very dangerous. It is not his use of the software to encrypt photos that is being used, because they have no evidence of that. It is the mere presence of the software, implying that its only possible use on his computer would be for criminal intent. That is the bad part.

      • I and many others in .dk regularly take large bags into shops. Simply because new bags cost significant money, we reuse old ones. So there are other reasons for entering shops with large bags.

        That aside, I still think it sets a dangerous precedent. Having a gun in your house surely does not mean you premeditated that murder in self-defense when you got burgled?

        -Lars
    • E.g., I do carry a bag or two with me almost at all times, because I sometimes just want to drop by at the grocery store and buy stuff on the way home from work. And I see no point in buying a new plastic bag each time.

      So basically if someone decided to accuse me of shoplifting, that bag -- even if not used at the time -- would suddenly be criminal intent. Seems bloody stupid to me.

      E.g., back in college I did have half of my hard drive encrypted -- and that was before the OS itself came with encryption --
  • Locks and Keys (Score:4, Interesting)

    by rscrawford ( 311046 ) <rscrawford AT undavis DOT edu> on Wednesday May 25, 2005 @12:51AM (#12631088) Homepage Journal
    My front door has a lock which can be opened only with my key. Therefore, I am hiding something reprehensible inside my house.

    Logic, people, logic!
  • Hmm (Score:4, Interesting)

    by pHatidic ( 163975 ) on Wednesday May 25, 2005 @12:51AM (#12631090)
    The article says the conviction was based in part on his searching for child pornography through search engines. However, if he used PGP to encrypt his HD then there is no way that law enforcement could have known this. Does that mean that Google or whichever search engine he was using logged his search history and handed it over to police??
  • Keys and Passwords (Score:3, Interesting)

    by urbaneassault ( 233554 ) on Wednesday May 25, 2005 @12:51AM (#12631091) Homepage
    Keys and passwords can be obtained during discovery, and failure to provide them is the same in the eyes of the law as not providing keys to your premises; you can be found in contempt for such.
    Why on earth did the court rule that the mere existence on this criminal's systems constituted criminal action?* Why didn't they ask for keys as part of the trial and find out what he had encrypted? All this does is punish us in the tech world by alluding to the use of cryptography as a criminal action.

    *And yes, this guy certainly deserves what he had coming, but don't punish me for his actions...
  • by DJOtaku ( 840299 ) on Wednesday May 25, 2005 @12:59AM (#12631141)
    What can I add to this that hasn't already been said half a dozen times. I use GPG (Gnu version of PGP) to digitally sign my email messages on my Linux machine. This is because certificates and other authentication methods cost money. GPG allows others to certify that I sent the message that claims to be from me. This is helpful for spam that parades as coming from me as well as other things. Additionally, as my family is starting up a business and we will all be in different states, the safest way for us to exchange information cheaply. Yeah, we have free long-distance on our cell phones, but for that we may as well be yelling out our windows. Email is likewise able to be tapped without some encryption. Thunderbird, enigmail, and GPG allow me to get a decent amount of protection for free. It isn't NSA-grade encryption, but it's good enough to stop most people. So yeah, I'm not a criminal because I use encryption. I just like to have some privacy. Otherwise why not just post my SSN to slashdot?
  • by craXORjack ( 726120 ) on Wednesday May 25, 2005 @01:01AM (#12631168)
    ...after it was discovered that the pen Mr. Levie had been carrying was actually a laser pointer. He was subsequently charged with intending to shine it in the eyes of airline pilots during landing and then sent to Cuba for a speedy but secret trial. His court appointed defense attourney later said, 'I've never met Mr. Levie but he was obviously guilty or he would not have been charged. May he rest in peace.'
  • by amliebsch ( 724858 ) on Wednesday May 25, 2005 @01:06AM (#12631194) Journal
    Finally, Schaub testified that, in a file entitled "research," he found the text of Minn. Stat. 617.246, which included "the definition of minor sexual performance, sexual conduct, things of that nature." He also testified that he found an encryption program, PGP, on appellant's computer; PGP "can basically encrypt any file;" and, "other than the National Security Agency," he was not aware of anyone who could break such an encryption. But Schaub also admitted that the PGP program may be included on every Macintosh computer that comes out today, and appellant may have had the text of Minn. Stat. 617.246 in his computer because of prior allegations against him.

    This appears to be the only discussion of the encryption issue:

    ANALYSIS I. Relevance Appellant first argues that he is entitled to a new trial because the district court erred in admitting irrelevant evidence of his internet usage and the existence of an encryption program on his computer. Rulings involving the relevancy of evidence are generally left to the sound discretion of the district court. State v. Swain, 269 N.W.2d 707, 714 (Minn. 1978). And rulings on relevancy will only be reversed when that discretion has been clearly abused. Johnson v. Washington County, 518 N.W.2d 594, 601 (Minn. 1994). "The party claiming error has the burden of showing both the error and the prejudice." State v. Horning, 535 N.W.2d 296, 298 (Minn. 1995). Appellant argues that his "internet use had nothing to do with the issues in this case;" "there was no evidence that there was anything encrypted on the computer;" and that he "was prejudiced because the court specifically used this evidence in its findings of fact and in reaching its verdict." We are not persuaded by appellant's arguments. The record shows that appellant took a large number of pictures of S.M. with a digital camera, and that he would upload those pictures onto his computer soon after taking them. We find that evidence of appellant's internet use and the existence of an encryption program on his computer was at least somewhat relevant to the state's case against him. See Minn. R. Evid. 401.

    The entire case is available at http://www.lawlibrary.state.mn.us/archive/ctappub/ 0505/opa040381-0503.htm [state.mn.us]

  • BS on CNET (Score:5, Insightful)

    by statemachine ( 840641 ) on Wednesday May 25, 2005 @01:09AM (#12631211)
    This is what the judge said (from the article):
    "We find that evidence of appellant's Internet use and the existence of an encryption program on his computer was at least somewhat relevant to the state's case against him," Judge R.A. Randall wrote in an opinion dated May 3.

    He did not say the encryption program was evidence of guilt.

    To say otherwise is tabloid "journalism."
    • Re:BS on CNET (Score:4, Interesting)

      by Beryllium Sphere(tm) ( 193358 ) on Wednesday May 25, 2005 @03:24AM (#12631789) Journal
      The trial judge allowed the jury to hear about the installation of PGP. The trial judge was accepting it as evidence of guilt.

      The appeals judges let this stand, saying in effect that a trial judge has to screw up bigtime before they'll undo that judge's decision, and that in their opinion the trial judge did have a leg to stand on.
      • Not hardly. (Score:3, Interesting)

        by rjh ( 40933 )
        The trial judge did not accept it as evidence of guilt. In the American system of jurisprudence, judges never make any determination as to whether evidence is implicating or exonerating. They only decide whether evidence is relevant. All other decisions--like how much credibility to put in the evidence, whether the evidence implicates or exonerates, all other decisions--lie in the hands of the jury. The framers of the Constitution didn't trust the government to judge evidence; all fact-finding was deleg
  • by NewtonsLaw ( 409638 ) on Wednesday May 25, 2005 @01:16AM (#12631241)
    George Fritz was arrested today on charges of conspiring to commit crimes.

    Police were first alerted to Fritz's activities when he dialed 911 to report a burglary in progress at his home in Elmwood drive.

    On arriving at the scene, police observed that the doors to Fritz's house were locked and that the intruder had been forced to break a window to gain entry.

    After aprehending and speaking with the intruder, police decided not to arrest him, relying on his promise not to re-offend.

    Fritz *was* arrested however, on suspicion of being involved in a crime or crimes unknown. Prosecutors say they have a pretty strong case against him -- after all, if he had nothing to hide, why did he lock his doors and draw his curtains -- thus forcing the would-be burglar to break a window?

    Film at eleven.
  • Case Closed (Score:3, Funny)

    by Doc Ruby ( 173196 ) on Wednesday May 25, 2005 @01:34AM (#12631334) Homepage Journal
    Other evidence, their locked front door clearly shows that this criminal must have something to hide. Or, clearly shows they need to hire a real lawyer.
  • by JoeBuck ( 7947 ) on Wednesday May 25, 2005 @02:21AM (#12631553) Homepage
    They didn't convict this sleazebag because he had PGP. They convicted him because the nine-year-old girl that he photographed nude testified against him!

    Now, said sleazebag is trying to get a new trial because the prosecutor was allowed to bring up his use of PGP. I certainly agree that mere presence of PGP does not prove criminal intent; after all, I have a similar program (GPG) on this machine. But even if that evidence should not have been allowed, it is at most a trivial error that did not appear to affect the case.

  • by Chris Tucker ( 302549 ) on Wednesday May 25, 2005 @02:22AM (#12631560) Homepage
    Look the judge instructed the jury that mere possession of encryption software could be used ti infer criminal intent on the part of THIS ONE PERSON!

    Damn! It's like the RIAA making a patently absurd claim that just because one COULD use an iPod for storing illegally copied MP3s, therefore ALL iPod owners are using them to store illegally downloaded MP3s...

    Oh, wait...

  • Relax (Score:4, Interesting)

    by jjohnson ( 62583 ) on Wednesday May 25, 2005 @03:13AM (#12631744) Homepage
    This is no different than the fact that a guy charged with burglary had a crowbar on him. When you're suspected of a crime, the presence of the tools to commit that crime or cover it up are relevent (though not dispositive) in a criminal trial. For a guy charged with making child porn, having a digital camera is relevent; doesn't mean that your digital camera alone is going to get you thrown in jail.

    This is a hail mary by the defense attorney that does nothing but put software on the same footing as other tools.
  • by alizard ( 107678 ) <alizard&ecis,com> on Wednesday May 25, 2005 @03:13AM (#12631747) Homepage
    when the computer-illiterate are permitted to make decisions involving technology.

    How many Linux distros have gpg installed by default? Should we automatically be suspected as criminals?

    How many PCs don't some form of encryption? Crypto includes browsers that support SSL... necessary for e-commerce. I'm sure that at least some of the judges have PCs and browsers. Should search warrants be obtained on this basis and their computers be checked for kiddie porn?

    With respect to crypto, I personally use it to keep proprietary technology and business discussions private and to digitally sign documents. I also plan to continue to do so even if it makes Minnesota judges think I must be a criminal of some sort.

    The court decision is... contemptible, but to be expected, it's from the same kind of ignorant people who voted the DMCA into law.

    The most charitable thing I can say is that a great many people's brains shut down immediately if the subject of child pornography comes up, and speculating as to why would. . . be very impolite.

  • by cp.tar ( 871488 ) <cp.tar.bz2@gmail.com> on Wednesday May 25, 2005 @03:48AM (#12631855) Journal
    I have a penis*.

    Therefore, in a rape case, this can be construed as criminal intent.
    This is good news for all Slashdot users; now you are gong to have sex at least in the eyes of the law...

    Furthermore, I normally keep my penis hidden in my pants, which obviously means I know that's wrong and am trying to hide it.
    As a consequence, criminal intent could not be established for flashing pervs; they do not seem to be hiding anything, at least... so that's OK.

    And to think I actually complain about Croatian judicial system, which is merely inefficient...

    *This is not a latest discovery, nor bragging; I really do need that** to prove my point.
    ** Please stop that.

  • by silence535 ( 101360 ) on Wednesday May 25, 2005 @04:17AM (#12631950) Homepage
    This clearly could only happen because everybody said: I have nothing to hide, so why use encryption?

    Every time I hear that argument I almost explode in a rage and claim that at times the usage of encryption alone will be held evidence that you're a criminal.

    These times start NOW.

    And by the way, this is YOUR fault you lazy bum.

    -jsl
  • by el_womble ( 779715 ) on Wednesday May 25, 2005 @04:22AM (#12631969) Homepage

    The great thing about computers is that they make finding and manipulating digital data a snap. The bad thing about computers is that they make find and manipulating digital data a snap. It's a double edged sword that is, at least partially, dulled by encryption and other security measures.

    You use a computer to generate sensitive data because its easier and more powerful than traditional methods, but that doesn't mean that you automatically want to forego the security that is implicit in a paper and pen solution.

    Does this mean that keeping your photo album in a 'locked' house is evidence of criminal intent?

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...